Title: Exploring Operating System Security Techniques: A Comparative Analysis

Should be 1.5 pages, double spaced, with 11 point font.
Students
are asked to make a thoughtful survey about operating system security. You need
to list and compare different techniques for the same purpose. For example, compile-time
buffer overflow defense methods vs. runtime buffer overflow defense methods.
You cannot gain full points if you just briefly introduce them. You need to
address your own thinking. For example, you consider runtime buffer overflow
defense methods are better. You should list all your reasons in details. The
creative thinking contents should be at least 40% of the whole contents.
OUTLINE
I.              
Process Protection Techniques
What is process
protection? Why we need to protect process? What are the attacks towards
process? How to protect process? List related techniques and compare them.
Address your own thinking.
II.           
Encryption Techniques
If the access control
policies fail to stop hacking behaviors, we still can protect data by
encryption in advance. Analyze potential encryption techniques used in
Operating Systems.
III.         
Reference
List all citations clearly.

Comments

Leave a Reply